Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 15:32

General

  • Target

    bee5f89c474078431cc042d125ea6145_JaffaCakes118.dll

  • Size

    86KB

  • MD5

    bee5f89c474078431cc042d125ea6145

  • SHA1

    d50344dc7b2ea735d3b30bce09b55f5c7996e144

  • SHA256

    8e4b52bbcf27888c18f4770abc0b77cf9b77b9df9fe9cb3d8e7b81c893ed8b0d

  • SHA512

    2827375b0d25f3155081f4b5f3682b3b8ec690c1a32c5f5f203121041514988a157d3e5a9457749a0f6dca15d6b60d82e4d5c3c0c75438ff4b79bbdb6ef7a846

  • SSDEEP

    1536:2zVclJRVFrkF/bd4mu2IgB6ln0kZhIktQIxkHkbEeSCKSjzvqIH1SC5KCcyErHK+:2zVOTEFjd4m1IoKS5tHkW03qatoHOO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bee5f89c474078431cc042d125ea6145_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\bee5f89c474078431cc042d125ea6145_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/740-0-0x0000000000280000-0x00000000002C3000-memory.dmp

    Filesize

    268KB